Category: Information Assurance and Security

Abstract – The requisite behaviors of fear and respect in dealing with information assurance and security topics building towards a professional or subject matter expert is highly valued. Creating situational and security awareness is an important behavior modification. Specifically the…

Guest blogger Alejandro Chavez looks at the different ways a common popular cell phone can easily be modified to become a hidden method of attacking networks. Mr. Chavez is a student at Purdue University Calumet and we thank him for…

Guest blogger Anthony Marszalek discusses in depth some of the concerns with cyber warfare and the ideas on how it exists (if it exists). He also discusses cyber terrorism and tries to make a distinction between the two. Mr. Marszalek…

Guest blogger Aron Okichich Brings up a hot topic to information technology and conflict awareness. As a student at Purdue University Calumet we thank him for allowing us to post his work here. You can download a PDF of his…

To recreate the Internet in a safe and sane environment that could realistically recreate the chaos of the Internet is a big issue. Some of the early design issues: 1) The Internet is inherently dynamic most designed systems are relatively…

In a recent Infoworld article by Tom Sullivan it is pointed out that companies are investigating or implementing policies and procedures to allow users to manage their own information technology assets. Link to infoworld story This is of course a…

While talking with one of my students tonight I was reminded of this article. How about using a microphone to hack the key of a system? Using acoustic signature to get the encryption key and other information as a passive…

The Air Force is moving ahead with work on the cyber command (LINK). Air Force moving ahead with Cyber Command The Air Force is moving ahead on establishing its new Cyber Command, searching for permanent facilities and planning meetings to…

“The US military is on the slow path to the realization that nation-building — from reconstruction to other forms of traditional COIN dogma that serve to return legitimacy to the government — doesn’t work. Politics and populations in our new…

Center of gravity constructs look at the strategic, operational, and tactical elements of an adversary to identify weak points in the over all capability of resistance. Cyber-warfare attacks the computing and communication infrastructure of the adversary through a variety of…

Is it possible that economic warfare could be waged on the United States or that we could be in the middle of a form of economic warfare? Some would say business is warfare and there is an expansive library of…

Office 2007 uses an XML based file format which have included bin files and formatting files in a single container. The actual container is a file folder or cabinet file that appears as a document file. This packaging convention is…

Abstract This paper discusses as an overview of the current methods and practices available to forensics investigator in order to ascertain whether a radio frequency device has been participating in a wireless network. Though many of the techniques are applicable…

Information assurance and security are a compilation of two other domains. The first domain is systems assurance. Systems assurance is the practice of hardening operating systems from known threats, analyzing and auditing hardware and devices for known threats, and remediating…

Web Resources

Cyber?

Cyber security and the technologies of securing the information enterprise of industry and government require a trans-disciplinary while still STEM focused research agenda. The term “cyber” itself denotes a human cognitive centric concept that deals with the disintermediation of technology centered within human activity. The changing focus from system threat mitigation to enterprise risk management has opened completely new areas of inquiry into security.

Power

Amateurs argue about crime and punishment. Experts argue about authorities and budgets.